SecurityCertified

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, March 7, 2011

Experts Talk US-China Security Issues, Part 2

Posted on 5:52 PM by Unknown
Several weeks ago I attended an outstanding one day conference by the Jamestown Foundation titled China Defense & Security 2011. The conference consisted of a series of speakers discussing various aspects of US-China national defense and security.

Only one speaker concentrated on digital (or "cyber," love that word) items. The rest dealt with a wide range of topics.

I took several pages of notes that I thought my benefit those not in attendance. I did not take notes on the one session that was considered "off the record."

In this post I will summarize my second page of notes.

Please see Experts Talk US-China Security Issues, Part 1 if you want to see what I discussed prior to this post.


  • Tai Ming Chung discussed Chinese innovation, specifically the nation's maturation from "imitation to innovation," specifically "architectural defense innovations." He described three models present in China:

    • Techno-nationalist "strategic mobilization," such as the Chinese lunar landing program

    • "Shanzhai," or "guerilla innovation," in the form of pirating/copying and reverse engineering

    • "Collaborative modularity," meaning the "absorption" and integration of foreign technology in joint ventures with the West



  • James Mulvenon was the resident digital security expert. I knew him from another China-centric forum I try to attend. He is really sharp and was incidentally the most entertaining speaker. Mr Mulvenon noted the Chinese and Russians are comfortable using digital means to exploit US weaknesses, while relying on plausible deniability to shield their activities. In contrast, the US can't even begin to have a public conversation about offensive digital activities.

    The Chinese see digital attacks differently than US planners. Chinese military planners saw one of the weaknesses of Saddam Hussein's "defense" of Iraq in the first Gulf War as his reluctance to strike US forces during their six month build-up in the desert. Chinese planners instead plan to deny and degrade US capabilities by attacking logistics trains prior to actual physical combat. Chinese planners also see "cyber" as a "bolt out of the blue" attack, on its own, and not as a "force multiplier" as US planners do.

    The Chinese sometimes launch attacks with hop points within the US so as to confuse US incident responders and to rely on US law to frustrate investigations.

    Mr Mulvenon advised attendees (some of whom wore uniforms of US and allied countries) to "look beyond the intrusion set." He said to play the Chinese "long game," which focuses on attacks against the US supply chain. Assume the adversary is already in our "core networks" and plans to stay. Disregard promises by Chinese vendors to allow inspection of their hardware. The Chinese will "ship clean" and then introduce malicious software via upgrades, maintenance, and other post-buy actions.

    Beyond the supply chain problem, Mr Mulvenon described a "longer game" whereby the Chinese seek to minimize US influence over Internet governance. They want to shift decision making from largely private bodies to government-controlled ones, i.e., from ICANN to the UN ITU. The Chinese want to remove inputs from non-governmental players and transition to a state-centric influence model where China excels at buying national votes.

    Unlike the US, China is executing a "coordinated national strategy" to achieve its ends.

    I found this comment very interesting: There is a huge disconnect between cleared and uncleared data sources on the Chinese military. In other words, if you're on the "outside," you're likely in the dark! This is dangerous for policymakers who rely on uncleared advisors.

  • Dean Cheng explained China's goal to become a "full space power." He started by discussing the Chinese idea of deterrence, which is not just disuasion (the US view) but also coercion by imposing a cost-benefit decision upon the adversary. China recognizes that information dominance requires space dominance, and it must hold at risk what the US values while challenging the US' ability to operate as it sees fit.

    Mr Cheng wondered how well the PLA executes on its strategy compared to its writings, especially since the Chinese military hasn't fought a shooting war since 1979.

    Mr Cheng noted the Chinese are becoming more vulnerable in space (like the US) as the transition from regional power projection to expeditionary and global power projection. James Mulvenon interjected that he doesn't think the Chinese recognize how vulnerable they are becoming.

  • Kurt Campbell explained how the US hosted Chinese military visitors in the 1996-1998 timeframe. US officials took a "Texas approach," basically showing how powerful the US military was. Initially the Chinese reacted with shock and awe, then as they finished each visit the US delegates could sense the Chinese had decided to respond by growing their own might. In other words, by saying "look how powerful we are; don't mess with us," the US had convinced the Chinese it was time to strengthen the PLA.

    China tends to rely more on hiding its strengths and shielding capabilities, following an "unpredictability" strategy. The PLA says "you don't know how strong we are" until they feel ready to provide a show of force, like destroying a satellite or testing a stealth fighter. Mr Campbell emphasized the need for "agreed areas of predictability" rather than "trust-building."

  • Dennis Blasko discussed the PLA. He described how "20-30%" of PLA training time is occupied by "political education." Crucially, 40% of a recruit's training time is spent listening to political education! (What a waste; good for us, bad for them.) In a nod to the Soviet model, Chinese units have two commanders; a military leader, and a "political commissar." The PLA also hosts a "uniformed civilian cadre" that sounds like a cross between US reservists and government civilians.

  • Ken Allen described the PLA Air Force. They operate decent technology but their people, culture, training, and operations are weak. For example, they rely on O-6s and O-5s to serve as air traffic controllers -- jobs done by enlisted people in the US. The PLAAF operates over 100 "air force academies." ("But none so fair that they can compare to the Air Academy." Sorry, my brainwashing came through. Yes, I know it's a stolen Army jody.)


A few other people spoke, but the notes I summarized here and in my previous post captured the most compelling comments I heard.
Tweet
Email ThisBlogThis!Share to XShare to Facebook
Posted in china | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Review of Intelligence, 4th Ed Posted
    Amazon.com just posted my five star review of Intelligence: From Secrets to Policy, 4th Ed by Mark Lowenthall . From the review : I was a...
  • DojoCon Videos Online
    Props to Marcus Carey for live streaming talks from DojoCon . I appeared in my keynote , plus panels on incident response and cloud secur...
  • A Book for the Korean Cyber Armies
    I've got a book for the Korean cyber armies, North and South. That's right, it's my first book , The Tao of Network Security Mo...
  • Practice of Network Security Monitoring Table of Contents
    Since many of you have asked, I wanted to provide an updated Table of Contents for my upcoming book, The Practice of Network Security Monito...
  • Mandiant APT1 Report: 25 Best Commentaries of the Last 12 Days
    Two weeks ago today our team at Mandiant was feverishly preparing the release of our APT1 report . In the twelve days that followed public...
  • Tort Law on Negligence
    If any lawyers want to contribute to this, please do. In my post Shodan: Another Step Towards Intrusion as a Service , some comments claim ...
  • Bejtlich's Thoughts on "Why Our Best Officers Are Leaving"
    Twenty-two years ago today I flew to Colorado Springs, CO and reported for Basic Cadet Training with the class of 1994 at the United States ...
  • My Role in Information Warfare during the Yugoslav Wars
    This morning I read a Tweet from @AirForceAssoc reminding me that: Today in Airpower History, August 30, 1995: NATO and U.S. aircraft bega...
  • Review of Crypto Posted
    Amazon.com just posted my four star review of Crypto by Steven Levy. From the review : Steven Levy's "Crypto" is a fascinati...
  • APT Presentation from July 2008
    Some of you may remember me mentioning the 2008 SANS WhatWorks in Incident Response and Forensic Solutions Summit organized by Rob Lee. I ...

Categories

  • afcert
  • Air Force
  • analysis
  • announcement
  • apt
  • attribution
  • bestbook
  • blackhat
  • books
  • breakers
  • bro
  • bruins
  • certification
  • china
  • cisco
  • cissp
  • cloud
  • clowns
  • commodore
  • conferences
  • controls
  • correlation
  • counterintelligence
  • cybercommand
  • cyberwar
  • dfm
  • education
  • engineering
  • feds
  • fisma
  • freebsd
  • GE
  • ge-cirt
  • hakin9
  • history
  • impressions
  • information warfare
  • ipv6
  • law
  • leadership
  • malware
  • mandiant
  • microsoft
  • mssp
  • nsm
  • offense
  • oisf
  • packetstash
  • philosophy
  • pirates
  • powerpoint
  • press
  • psirt
  • reading
  • redteam
  • reviews
  • russia
  • sans
  • sec
  • sguil
  • snorby
  • spying
  • threat model
  • threats
  • Traffic Talk
  • training
  • tufte
  • tv
  • ubuntu
  • usenix
  • verizon
  • vulnerabilities
  • wisdom
  • writing

Blog Archive

  • ►  2013 (16)
    • ►  September (1)
    • ►  August (1)
    • ►  June (2)
    • ►  April (2)
    • ►  March (1)
    • ►  February (3)
    • ►  January (6)
  • ►  2012 (60)
    • ►  December (4)
    • ►  November (5)
    • ►  October (3)
    • ►  September (10)
    • ►  August (2)
    • ►  July (6)
    • ►  June (6)
    • ►  May (4)
    • ►  April (2)
    • ►  March (9)
    • ►  February (6)
    • ►  January (3)
  • ▼  2011 (108)
    • ►  December (3)
    • ►  November (7)
    • ►  October (11)
    • ►  September (9)
    • ►  August (18)
    • ►  July (10)
    • ►  June (5)
    • ►  May (4)
    • ►  April (13)
    • ▼  March (17)
      • All Reading Is Not Equal or Fast
      • Review of Hacking Exposed: Web Applications, 3rd Ed
      • Review of iOS Forensic Analysis Posted
      • Review of Computer Incident Response and Product S...
      • Review of pfSense: The Definitive Guide Posted
      • Mini-Review of The Book of Pf Posted
      • Review of Kingpin Posted
      • Report on Declarations of War
      • Requesting Comments on Open Information Security F...
      • Initial Thoughts on RSA "APT" Announcement
      • Bejtlich Joining MANDIANT as CSO and Security Serv...
      • Report on Instances of US Forces Abroad
      • Bejtlich Teaching Special Session of TCP/IP Weapon...
      • Experts Talk US-China Security Issues, Part 2
      • Experts Talk US-China Security Issues, Part 1
      • Review of Cyber Attacks Posted
      • Bejtlich Teaching Two Sessions at Black Hat USA 2011
    • ►  February (2)
    • ►  January (9)
  • ►  2010 (193)
    • ►  December (14)
    • ►  November (11)
    • ►  October (6)
    • ►  September (16)
    • ►  August (15)
    • ►  July (26)
    • ►  June (15)
    • ►  May (15)
    • ►  April (15)
    • ►  March (16)
    • ►  February (19)
    • ►  January (25)
  • ►  2009 (123)
    • ►  December (10)
    • ►  November (17)
    • ►  October (21)
    • ►  September (13)
    • ►  August (20)
    • ►  July (21)
    • ►  June (21)
Powered by Blogger.

About Me

Unknown
View my complete profile